Shorter identity-based encryption via asymmetric pairings

نویسندگان

  • Jie Chen
  • Hoon Wei Lim
  • San Ling
  • Huaxiong Wang
  • Hoeteck Wee
چکیده

We present efficient Identity-Based Encryption (IBE) under the Symmetric External DiffieHellman (SXDH) assumption in bilinear groups. In our IBE scheme, all parameters have constant numbers of group elements, and are shorter than those of previous constructions based on Decisional Linear (DLIN) assumption. Our construction uses both dual system encryption (Waters, Crypto ’09) and dual pairing vector spaces (Okamoto and Takashima, Pairing ’08, Asiacrypt ’09). Specifically, we show how to adapt the recent DLIN-based instantiation of Lewko (Eurocrypt ’12) to the SXDH assumption. To our knowledge, this is the first work to instantiate either dual system encryption or dual pairing vector spaces under the SXDH assumption. Furthermore, our work could be extended to many other Functional Encryption. Particularly, we show how to instantiate our framework to Inner Product Encryption (IPE) and Key-Policy Functional Encryption (KP-FE). All parameters of our constructions are shorter than those of DLIN-based constructions. ⋆ Research of the authors is supported in part by the National Research Foundation of Singapore under Research Grant NRF-CRP2-2007-03. Hoeteck Wee’s work is also supported by NSF CAREER Award CNS-1237429.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Shorter IBE and Signatures via Asymmetric Pairings

We present efficient Identity-Based Encryption (IBE) and signature schemes under the Symmetric External Diffie-Hellman (SXDH) assumption in bilinear groups; our IBE scheme also achieves anonymity. In both the IBE and the signature schemes, all parameters have constant numbers of group elements, and are shorter than those of previous constructions based on Decisional Linear (DLIN) assumption. Ou...

متن کامل

Anonymous Constant-Size Ciphertext HIBE from Asymmetric Pairings

We present a new hierarchical identity based encryption (HIBE) scheme with constant-size ciphertext that can be implemented using the most efficient bilinear pairings, namely, Type-3 pairings. In addition to being fully secure, our scheme is anonymous. The HIBE is obtained by extending an asymmetric pairing based IBE scheme due to Lewko and Waters. The extension uses the approach of Boneh-Boyen...

متن کامل

Variants of Waters’ Dual-System Primitives Using Asymmetric Pairings

Waters, in 2009, introduced an important technique, called dual-system encryption, to construct identity-based encryption (IBE) and related schemes. The resulting IBE scheme was described in the setting of symmetric pairing. A key feature of the construction is the presence of random tags in the ciphertext and decryption key. Later work by Lewko and Waters has removed the tags and proceeding th...

متن کامل

New identity based signcryption schemes from pairings

We present a new identity based scheme based on pairings over elliptic curves. It combines the functionalities of signature and encryption and is provably secure in the random oracle model. We compare it with Malone-Lee’s one from security and efficiency points of view. We give a formal proof of semantical security under the Decisional Bilinear Diffie-Hellman assumption for this new scheme and ...

متن کامل

Pairings in Trusted Computing

Pairings have now been used for constructive applications in cryptography for around eight years. In that time the range of applications has grown from a relatively narrow one of identity based encryption and signatures, through to more advanced protocols. In addition implementors have realised that pairing protocols once presented can often be greatly simplified or expanded using the mathemati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Des. Codes Cryptography

دوره 73  شماره 

صفحات  -

تاریخ انتشار 2014